Seguir
Jason Hong
Título
Citado por
Citado por
Año
Cyberguide: A mobile context‐aware tour guide
GD Abowd, CG Atkeson, J Hong, S Long, R Kooper, M Pinkerton
Wireless networks 3, 421-433, 1997
23541997
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
12152007
The design of sites: patterns, principles, and processes for crafting a customer-centered Web experience
D van Duyne, JA Landay, JI Hong
Addison-Wesley Professional, 2003
972*2003
An Architecture for Privacy-Sensitive Ubiquitous Computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
8822004
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, JI Hong
🎖️ Proceedings of the SIGCHI Conference on Human Factors in Computing …, 2008
8692008
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, JI Hong, N Sadeh
🏆 Sixth International AAAI Conference on Weblogs and Social Media - Best …, 2012
8222012
The state of phishing attacks
J Hong
Communications of the ACM 55 (1), 74-81, 2012
7902012
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, JI Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
7772007
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
🎖️ Proceedings of the 2012 ACM conference on ubiquitous computing - Best …, 2012
6502012
SATIN: a toolkit for informal ink-based applications
JI Hong, JA Landay
ACM Symposium on User Interface Software and Technology, 12, 2000
636*2000
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, JI Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
6342009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, JI Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
6302010
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
6152011
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, JI Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
6142011
An infrastructure approach to context-aware computing
JI Hong, JA Landay
Human–computer interaction 16 (2-4), 287-303, 2001
5822001
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
5642013
Teaching Johnny not to fall for phish
P Kumaraguru, S Sheng, A Acquisti, LF Cranor, J Hong
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
5372010
An empirical analysis of phishing blacklists
S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang
Carnegie Mellon University, 2009
5302009
DENIM: Finding a tighter fit between tools and practice for web site design
J Lin, MW Newman, JI Hong, JA Landay
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2000
4792000
Protecting people from phishing: the design and evaluation of an embedded training email system
P Kumaraguru, Y Rhee, A Acquisti, LF Cranor, JI Hong, E Nunge
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
4782007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20